In this chapter, we will discuss threats and vulnerabilities facing computer users and systems today, and differentiate among them so you will be well equipped to both prevent them and remediate them when they occur. This chapter will cover types of malware and attacks, including viruses, spyware, Trojans, rootkits, DDoS attacks, smurf attacks, phishing, and vishing. It will also detail special types of attacks, such as those made using social engineering, over wireless networks, and utilizing application exploits. Finally, we will look at mitigation and deterrent techniques, as well as the tools available to test and find threats and vulnerabilities . . .
The content below this message is for members only.